Explore >> Select a destination


You are here

tomverbeure.github.io
| | www.shogunlab.com
5.2 parsecs away

Travel
| | Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we'll be building on the concepts we learned in Part 0 and introduce some new topics
| | www.malwaretech.com
6.0 parsecs away

Travel
| | "Discovery requires experimentation"
| | prog.world
5.3 parsecs away

Travel
| | [AI summary] The article discusses the use of Intel Processor Trace (PT) technology to capture code traces from the System Management Mode (SMM) in a computer's BIOS. The authors detail the process of creating a backdoor to access SMM, modifying the SMI dispatcher to redirect execution to a custom shellcode, and using tools like WinIPT and ptxed to analyze the trace data. They also mention challenges such as synchronization issues and the need for cross-platform compatibility, and conclude that this method provides an efficient way to investigate SMM code for vulnerabilities.
| | www.strongdm.com
26.0 parsecs away

Travel
| Passwordless authentication is a verification method in which a user gains access to a network, application, or system without a knowledge-based factor ...